Security

Security | News, how-tos, features, reviews, and videos

online dating scams hacker
vulnerable cryptojacking hacking breach security

recruiting thinkstock

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

fail stamp

Top 10 worst password FAILS of 2018

The worst password offenders this year have been revealed. Top on the list: Kanye West's on-TV reveal of his iPhone password of 000000.

13 communicate security strategy threat education

Finally, a meaningful congressional report on stemming cybersecurity attacks

The Cybersecurity Strategy Report offers solutions to six problem areas in an effort to improve IT's ability to cope with today's cyber threat landscape.

email security risk - phishing / malware

How to stop malicious email forwarding in Outlook

Microsoft Office 365 administrators can use these settings to find and delete hidden rules attackers use to intercept Outlook email messages.

stealing a password

Researchers find over 40,000 stolen logins for government portals

A phishing operation led to the theft of more than 40,000 login credentials for government services in 30 countries.

google pixel slate keyboard with hands2

What is a keylogger? How attackers can monitor everything you type

Keystroke logging software is one of the oldest forms of malware, dating back to typewriters. It's still popular and often used as part of larger cyber attacks.

cloud security

Review: How StackRox protects containers

StackRox fully integrates with Kubernetes so that it touches all three phases of containerization deployment: the building of the containers, the deployment of them into the cloud infrastructure, and finally the running of those...

bridgestone data center 1968

8 old technologies that still play roles in security

Newer isn't always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems.

Hacking stealing password data

Attacking from inside, cyber crooks rake in millions from banks

Crooks stole tens of millions of dollars from banks with hacks involving hidden devices and direct connections to local networks.

risk assessment - safety analysis - security audit

Cyber risk management continues to grow more difficult

Primary reasons why cyber risk management is more difficult include increasing workloads, sophisticated threats, and more demanding business executives.

pc antivirus

Best antivirus software: 14 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

login password - user permissions - administrative control

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks.

binary code matrix broken / breached / failed / hacked / security risk / threat / vulnerability

Hackers get into National Republican Congressional Committee's email system

The National Republican Congressional Committee's email system was hacked leading up to midterm elections.

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

security internet network encryption privacy padlock

What is SSL, TLS? And why it’s time to upgrade to TLS 1.3

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

update arrows in motion amid circuits

How to use Windows Update Delivery Optimization to distribute updates across your network

These are the Delivery Optimization settings you need to know to deliver feature and security updates without using Windows Software Update Services.

eye binary retina scanner security identity access management

Microsoft, Mastercard propose universal digital identity program

Microsoft and Mastercard say the “single, reusable digital identity” could solve identity verification issues and help with fraud prevention.

Gate Smart Lock

What is physical security? How to keep your facilities and devices safe from on-site attackers

Securing premises and devices from physical attacks can be just as challenging as defending against cyber threats. Automation and AI are increasingly used to shore up defenses.

Load More